General

  • Target

    d5a57c30b7e68141bca075e339ac730a_JaffaCakes118

  • Size

    221KB

  • Sample

    240909-e1bcgstgpa

  • MD5

    d5a57c30b7e68141bca075e339ac730a

  • SHA1

    37a6d1f4ecfb1b8a1af9a58a0cc0fc68a27f9aa5

  • SHA256

    9ac8bfcba379dd0e17620a799cb1c82e35207107771dc35a9966db6c9e4444e5

  • SHA512

    7568369655c4ac8e29858d358d37c79c3515fea6904716a40a5530e1b6f93e025eb4e61bc003ba17639d191adc804816b60aeb5cab97c2fe4abc7c49cee63fcc

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovpySGju9jDW1M+7Yp3i:EtcnvE140o8tIP4apNjDjmOi

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Targets

    • Target

      d5a57c30b7e68141bca075e339ac730a_JaffaCakes118

    • Size

      221KB

    • MD5

      d5a57c30b7e68141bca075e339ac730a

    • SHA1

      37a6d1f4ecfb1b8a1af9a58a0cc0fc68a27f9aa5

    • SHA256

      9ac8bfcba379dd0e17620a799cb1c82e35207107771dc35a9966db6c9e4444e5

    • SHA512

      7568369655c4ac8e29858d358d37c79c3515fea6904716a40a5530e1b6f93e025eb4e61bc003ba17639d191adc804816b60aeb5cab97c2fe4abc7c49cee63fcc

    • SSDEEP

      3072:b4tcTvjvTY140818tIP4ovpySGju9jDW1M+7Yp3i:EtcnvE140o8tIP4apNjDjmOi

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks